Clone of https://github.com/NixOS/nixpkgs.git (to stress-test knotserver)

Merge staging-next into staging

authored by nixpkgs-ci[bot] and committed by GitHub 85b58728 950fb490

+527 -216
+3
ci/github-script/labels.js
··· 263 263 'assigned', 264 264 'commented', // uses updated_at, because that could be > created_at 265 265 'committed', // uses committer.date 266 + ...(item.labels.some(({ name }) => name === '5.scope: tracking') 267 + ? ['cross-referenced'] 268 + : []), 266 269 'head_ref_force_pushed', 267 270 'milestoned', 268 271 'pinned',
+1 -1
nixos/modules/hardware/fw-fanctrl.nix
··· 30 30 Additional config entries for the fw-fanctrl service (documentation: <https://github.com/TamtamHero/fw-fanctrl/blob/main/doc/configuration.md>) 31 31 ''; 32 32 type = lib.types.submodule { 33 - freeformType = configFormat.type; 33 + freeformType = lib.types.attrsOf configFormat.type; 34 34 options = { 35 35 defaultStrategy = lib.mkOption { 36 36 type = lib.types.str;
+8 -3
nixos/modules/programs/openvpn3.nix
··· 18 18 options 19 19 lists 20 20 ; 21 - inherit (lib.types) bool submodule ints; 21 + inherit (lib.types) 22 + bool 23 + submodule 24 + ints 25 + attrsOf 26 + ; 22 27 in 23 28 { 24 29 options.programs.openvpn3 = { ··· 33 38 description = "Options stored in {file}`/etc/openvpn3/netcfg.json` configuration file"; 34 39 default = { }; 35 40 type = submodule { 36 - freeformType = json.type; 41 + freeformType = attrsOf json.type; 37 42 options = { 38 43 systemd_resolved = mkOption { 39 44 type = bool; ··· 57 62 description = "Options stored in {file}`/etc/openvpn3/log-service.json` configuration file"; 58 63 default = { }; 59 64 type = submodule { 60 - freeformType = json.type; 65 + freeformType = attrsOf json.type; 61 66 options = { 62 67 journald = mkOption { 63 68 description = "Use systemd-journald";
+3 -3
nixos/modules/security/agnos.nix
··· 15 15 inherit (lib) types mkOption; 16 16 in 17 17 types.submodule { 18 - freeformType = format.type; 18 + freeformType = types.attrsOf format.type; 19 19 20 20 options = { 21 21 email = mkOption { ··· 53 53 inherit (lib) types literalExpression mkOption; 54 54 in 55 55 types.submodule { 56 - freeformType = format.type; 56 + freeformType = types.attrsOf format.type; 57 57 58 58 options = { 59 59 domains = mkOption { ··· 91 91 settings = mkOption { 92 92 description = "Settings"; 93 93 type = types.submodule { 94 - freeformType = format.type; 94 + freeformType = types.attrsOf format.type; 95 95 96 96 options = { 97 97 dns_listen_addr = mkOption {
+1 -1
nixos/modules/services/admin/meshcentral.nix
··· 24 24 - [Old homepage with documentation link](https://www.meshcommander.com/meshcentral2) 25 25 ''; 26 26 type = types.submodule { 27 - freeformType = configFormat.type; 27 + freeformType = attrsOf configFormat.type; 28 28 }; 29 29 example = { 30 30 settings = {
+13 -1
nixos/modules/services/networking/bind.nix
··· 266 266 ''; 267 267 }; 268 268 269 + extraArgs = lib.mkOption { 270 + type = lib.types.listOf lib.types.str; 271 + default = [ ]; 272 + description = '' 273 + Additional command-line arguments to pass to named. 274 + ''; 275 + example = [ 276 + "-n" 277 + "4" 278 + ]; 279 + }; 280 + 269 281 configFile = lib.mkOption { 270 282 type = lib.types.path; 271 283 default = confFile; ··· 315 327 316 328 serviceConfig = { 317 329 Type = "forking"; # Set type to forking, see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900788 318 - ExecStart = "${bindPkg.out}/sbin/named ${lib.optionalString cfg.ipv4Only "-4"} -c ${cfg.configFile}"; 330 + ExecStart = "${bindPkg.out}/sbin/named ${lib.optionalString cfg.ipv4Only "-4"} -c ${cfg.configFile} ${lib.concatStringsSep " " cfg.extraArgs}"; 319 331 ExecReload = "${bindPkg.out}/sbin/rndc -k '/etc/bind/rndc.key' reload"; 320 332 ExecStop = "${bindPkg.out}/sbin/rndc -k '/etc/bind/rndc.key' stop"; 321 333 User = bindUser;
+36 -10
nixos/modules/services/networking/tailscale.nix
··· 84 84 description = '' 85 85 A file containing the auth key. 86 86 Tailscale will be automatically started if provided. 87 + 88 + Services that bind to Tailscale IPs should order using {option}`systemd.services.<name>.after` `tailscaled-autoconnect.service`. 87 89 ''; 88 90 }; 89 91 ··· 116 118 117 119 extraUpFlags = mkOption { 118 120 description = '' 119 - Extra flags to pass to {command}`tailscale up`. Only applied if `authKeyFile` is specified."; 121 + Extra flags to pass to {command}`tailscale up`. Only applied if {option}`services.tailscale.authKeyFile` is specified. 120 122 ''; 121 123 type = types.listOf types.str; 122 124 default = [ ]; ··· 183 185 wants = [ "tailscaled.service" ]; 184 186 wantedBy = [ "multi-user.target" ]; 185 187 serviceConfig = { 186 - Type = "oneshot"; 188 + Type = "notify"; 187 189 }; 188 - # https://github.com/tailscale/tailscale/blob/v1.72.1/ipn/backend.go#L24-L32 190 + path = [ 191 + cfg.package 192 + pkgs.jq 193 + ]; 194 + enableStrictShellChecks = true; 189 195 script = 190 196 let 191 - statusCommand = "${lib.getExe cfg.package} status --json --peers=false | ${lib.getExe pkgs.jq} -r '.BackendState'"; 192 197 paramToString = v: if (builtins.isBool v) then (lib.boolToString v) else (toString v); 193 198 params = lib.pipe cfg.authKeyParameters [ 194 199 (lib.filterAttrs (_: v: v != null)) ··· 197 202 (params: if params != "" then "?${params}" else "") 198 203 ]; 199 204 in 205 + # bash 200 206 '' 201 - while [[ "$(${statusCommand})" == "NoState" ]]; do 202 - sleep 0.5 207 + getState() { 208 + tailscale status --json --peers=false | jq -r '.BackendState' 209 + } 210 + 211 + lastState="" 212 + while state="$(getState)"; do 213 + if [[ "$state" != "$lastState" ]]; then 214 + # https://github.com/tailscale/tailscale/blob/v1.72.1/ipn/backend.go#L24-L32 215 + case "$state" in 216 + NeedsLogin) 217 + echo "Server needs authentication, sending auth key" 218 + tailscale up --auth-key "$(cat ${cfg.authKeyFile})${params}" ${escapeShellArgs cfg.extraUpFlags} 219 + ;; 220 + Running) 221 + echo "Tailscale is running" 222 + systemd-notify --ready 223 + exit 0 224 + ;; 225 + *) 226 + echo "Waiting for Tailscale State = Running or systemd timeout" 227 + ;; 228 + esac 229 + fi 230 + echo "State = $state" 231 + lastState="$state" 232 + sleep .5 203 233 done 204 - status=$(${statusCommand}) 205 - if [[ "$status" == "NeedsLogin" || "$status" == "NeedsMachineAuth" ]]; then 206 - ${lib.getExe cfg.package} up --auth-key "$(cat ${cfg.authKeyFile})${params}" ${escapeShellArgs cfg.extraUpFlags} 207 - fi 208 234 ''; 209 235 }; 210 236
+4 -5
nixos/modules/services/security/oauth2-proxy-nginx.nix
··· 97 97 virtualHosts.${vhost} = { 98 98 locations = { 99 99 "/".extraConfig = '' 100 + auth_request_set $user $upstream_http_x_auth_request_user; 101 + auth_request_set $email $upstream_http_x_auth_request_email; 102 + auth_request_set $auth_cookie $upstream_http_set_cookie; 103 + 100 104 # pass information via X-User and X-Email headers to backend, requires running with --set-xauthrequest flag 101 105 proxy_set_header X-User $user; 102 106 proxy_set_header X-Email $email; ··· 141 145 extraConfig = '' 142 146 auth_request /oauth2/auth; 143 147 error_page 401 = @redirectToAuth2ProxyLogin; 144 - 145 - # set variables being used in locations."/".extraConfig 146 - auth_request_set $user $upstream_http_x_auth_request_user; 147 - auth_request_set $email $upstream_http_x_auth_request_email; 148 - auth_request_set $auth_cookie $upstream_http_set_cookie; 149 148 ''; 150 149 }; 151 150 }) cfg.virtualHosts)
+1 -1
nixos/modules/system/boot/loader/systemd-boot/systemd-boot-builder.py
··· 362 362 available_version = available_match.group(1) 363 363 364 364 if installed_version < available_version: 365 - print("updating systemd-boot from %s to %s" % (installed_version, available_version)) 365 + print("updating systemd-boot from %s to %s" % (installed_version, available_version), file=sys.stderr) 366 366 run( 367 367 [f"{SYSTEMD}/bin/bootctl", f"--esp-path={EFI_SYS_MOUNT_POINT}"] 368 368 + bootctl_flags
+3 -3
pkgs/applications/emulators/libretro/cores/fceumm.nix
··· 5 5 }: 6 6 mkLibretroCore { 7 7 core = "fceumm"; 8 - version = "0-unstable-2025-09-03"; 8 + version = "0-unstable-2025-09-13"; 9 9 10 10 src = fetchFromGitHub { 11 11 owner = "libretro"; 12 12 repo = "libretro-fceumm"; 13 - rev = "a5dbb223fc27cc4c7763c977682cfe3b3450d482"; 14 - hash = "sha256-K52Q9KDMgUUY5kmWNuMcZhib5nPdITMt5hXFyDPX+MU="; 13 + rev = "5cd4a43e16a7f3cd35628d481c347a0a98cfdfa2"; 14 + hash = "sha256-/FvXQlp20QMFg1uPmj2HSJFXhzBunygOmGEtGNGJyxk="; 15 15 }; 16 16 17 17 meta = {
+8 -8
pkgs/applications/networking/cluster/terraform-providers/providers.json
··· 849 849 "vendorHash": "sha256-QWBzQXx/dzWZr9dn3LHy8RIvZL1EA9xYqi7Ppzvju7g=" 850 850 }, 851 851 "mongodbatlas": { 852 - "hash": "sha256-IWawVQ+m1NeGqMTrtSE4bH/220tdP2Figqb6yviVEUo=", 852 + "hash": "sha256-DaGJHlprTlOfbYmXL0rqbxjbs0azi3aUzdutNv62Kc0=", 853 853 "homepage": "https://registry.terraform.io/providers/mongodb/mongodbatlas", 854 854 "owner": "mongodb", 855 855 "repo": "terraform-provider-mongodbatlas", 856 - "rev": "v1.40.0", 856 + "rev": "v1.41.0", 857 857 "spdx": "MPL-2.0", 858 - "vendorHash": "sha256-XhsoMZc/7zh5AoJtpETVHVvmxSkfMYtJGho+Cy06VMs=" 858 + "vendorHash": "sha256-bSLbYA6phEi3jvsiSrcWfH1f2/ZdW+9JIA25pDRaDnQ=" 859 859 }, 860 860 "namecheap": { 861 861 "hash": "sha256-fHH9sHI1mqQ9q9nX9DHJ0qfEfmDB4/2uzyVvUuIAF18=", ··· 1030 1030 "vendorHash": null 1031 1031 }, 1032 1032 "pagerduty": { 1033 - "hash": "sha256-iRSd0olC82nr/Uzogg5DsiPAQIVLJRzM2wI9yubs/cw=", 1033 + "hash": "sha256-PkDugN/y3WmsNdl8+3/3l2tEWilJSEnJPdfkTzCm5mE=", 1034 1034 "homepage": "https://registry.terraform.io/providers/PagerDuty/pagerduty", 1035 1035 "owner": "PagerDuty", 1036 1036 "repo": "terraform-provider-pagerduty", 1037 - "rev": "v3.28.2", 1037 + "rev": "v3.29.0", 1038 1038 "spdx": "MPL-2.0", 1039 1039 "vendorHash": null 1040 1040 }, ··· 1535 1535 "vendorHash": "sha256-GRnVhGpVgFI83Lg34Zv1xgV5Kp8ioKTFV5uaqS80ATg=" 1536 1536 }, 1537 1537 "yandex": { 1538 - "hash": "sha256-JTQnnJUr6qX1KilrwE1VQi74krq1ci4+iz/8jHaHmXY=", 1538 + "hash": "sha256-ANr3qJO3LMjqJa6RNjEaEOF7iV0DyqkihAir1FfJWzs=", 1539 1539 "homepage": "https://registry.terraform.io/providers/yandex-cloud/yandex", 1540 1540 "owner": "yandex-cloud", 1541 1541 "repo": "terraform-provider-yandex", 1542 - "rev": "v0.156.0", 1542 + "rev": "v0.158.0", 1543 1543 "spdx": "MPL-2.0", 1544 - "vendorHash": "sha256-LovDyADJeMQpIW3YqrdoNChmRf4XDBZK3DG/oOmtxOI=" 1544 + "vendorHash": "sha256-bmjr1pKK7rVWNa9VF5R/FRxvVJI2Riua9Vdh5pR2p1I=" 1545 1545 } 1546 1546 }
+2 -2
pkgs/applications/networking/instant-messengers/discord/default.nix
··· 11 11 { 12 12 stable = "0.0.108"; 13 13 ptb = "0.0.160"; 14 - canary = "0.0.752"; 14 + canary = "0.0.756"; 15 15 development = "0.0.85"; 16 16 } 17 17 else ··· 34 34 }; 35 35 canary = fetchurl { 36 36 url = "https://canary.dl2.discordapp.net/apps/linux/${version}/discord-canary-${version}.tar.gz"; 37 - hash = "sha256-6hq0KIXR9j/AHGPyQIXjhf1uJiYizxB5Nu+0unn/frE="; 37 + hash = "sha256-jn7s8T04us+9iTcHuM57F4sO10fs98ZjGQa0pF1SFjk="; 38 38 }; 39 39 development = fetchurl { 40 40 url = "https://development.dl2.discordapp.net/apps/linux/${version}/discord-development-${version}.tar.gz";
+9 -11
pkgs/applications/networking/seafile-client/default.nix pkgs/by-name/se/seafile-client/package.nix
··· 5 5 fetchFromGitHub, 6 6 pkg-config, 7 7 cmake, 8 - qttools, 9 - qt5compat, 8 + qt6, 10 9 libuuid, 11 10 seafile-shared, 12 11 jansson, 13 12 libsearpc, 14 13 withShibboleth ? true, 15 - qtwebengine, 16 - wrapQtAppsHook, 17 14 }: 18 15 19 16 stdenv.mkDerivation rec { 20 17 pname = "seafile-client"; 21 - version = "9.0.14"; 18 + version = "9.0.15"; 22 19 23 20 src = fetchFromGitHub { 24 21 owner = "haiwen"; 25 22 repo = "seafile-client"; 26 - rev = "v${version}"; 27 - hash = "sha256-ZMhU0uXAC3tH1e3ktiHhC5YCDwFOnILretPgjYYa9DQ="; 23 + tag = "v${version}"; 24 + hash = "sha256-BV1+9/+ryZB1BQyRJ5JaIU6bbOi4h8vt+V+FQIfUJp8="; 28 25 }; 29 26 30 27 patches = [ ··· 40 37 libuuid 41 38 pkg-config 42 39 cmake 43 - wrapQtAppsHook 44 - qttools 40 + qt6.wrapQtAppsHook 41 + qt6.qttools 45 42 ]; 46 43 47 44 buildInputs = [ 48 - qt5compat 45 + qt6.qt5compat 49 46 seafile-shared 50 47 jansson 51 48 libsearpc 52 49 ] 53 - ++ lib.optional withShibboleth qtwebengine; 50 + ++ lib.optional withShibboleth qt6.qtwebengine; 54 51 55 52 cmakeFlags = lib.optional withShibboleth "-DBUILD_SHIBBOLETH_SUPPORT=ON"; 56 53 ··· 60 57 61 58 meta = with lib; { 62 59 homepage = "https://github.com/haiwen/seafile-client"; 60 + changelog = "https://github.com/haiwen/seafile-client/releases/tag/${src.tag}"; 63 61 description = "Desktop client for Seafile, the Next-generation Open Source Cloud Storage"; 64 62 license = licenses.asl20; 65 63 platforms = platforms.linux;
+8
pkgs/by-name/aw/awscli2/package.nix
··· 119 119 less 120 120 ]; 121 121 122 + # Prevent breakage when running in a Python environment: https://github.com/NixOS/nixpkgs/issues/47900 123 + makeWrapperArgs = [ 124 + "--unset" 125 + "NIX_PYTHONPATH" 126 + "--unset" 127 + "PYTHONPATH" 128 + ]; 129 + 122 130 nativeCheckInputs = with py.pkgs; [ 123 131 addBinToPathHook 124 132 jsonschema
+3 -3
pkgs/by-name/bc/bcachefs-tools/package.nix
··· 29 29 30 30 stdenv.mkDerivation (finalAttrs: { 31 31 pname = "bcachefs-tools"; 32 - version = "1.25.3"; 32 + version = "1.31.0"; 33 33 34 34 src = fetchFromGitHub { 35 35 owner = "koverstreet"; 36 36 repo = "bcachefs-tools"; 37 37 tag = "v${finalAttrs.version}"; 38 - hash = "sha256-Nij4mOJPVA03u6mpyKsFR7vgQ9wihiNfnlSlh6MNXP0="; 38 + hash = "sha256-wYlfU4PTcVSPSHbIIDbl8pBOJsBAAl44XBapwFZ528U="; 39 39 }; 40 40 41 41 nativeBuildInputs = [ ··· 66 66 67 67 cargoDeps = rustPlatform.fetchCargoVendor { 68 68 src = finalAttrs.src; 69 - hash = "sha256-QkpsAQSoCmAihrE5YGzp9DalEQr+2djiPhLTXRn0u6U="; 69 + hash = "sha256-ZCzw3cDpQ8fb2jLYdIWrmlNTPStikIs09jx6jzzC2vM="; 70 70 }; 71 71 72 72 makeFlags = [
+3 -3
pkgs/by-name/fo/fosrl-gerbil/package.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "gerbil"; 10 - version = "1.1.0"; 10 + version = "1.2.1"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "fosrl"; 14 14 repo = "gerbil"; 15 15 tag = version; 16 - hash = "sha256-vfeI3GNI910FQmHK53E6yPrWF3tQtjrpQ/oP2PcDzs4="; 16 + hash = "sha256-Pnti0agkohRBWQ42cqNOA5TnnSLP9JbOK1eyGf88cao="; 17 17 }; 18 18 19 - vendorHash = "sha256-m6UfW+DVT0T/t7fiqZXc2ihg2O07C7LnR0uy4FDWPCA="; 19 + vendorHash = "sha256-Sz+49ViQUwJCy7wXDrQf7c76rOZbSGBCgB+Du8T6ug0="; 20 20 21 21 # patch out the /usr/sbin/iptables 22 22 postPatch = ''
+3 -3
pkgs/by-name/fo/fosrl-newt/package.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "newt"; 10 - version = "1.4.2"; 10 + version = "1.4.4"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "fosrl"; 14 14 repo = "newt"; 15 15 tag = version; 16 - hash = "sha256-yfQ9w1PKLhdpakZQLnQEcOAxpA4LC4S2OFX4dYKgDKw="; 16 + hash = "sha256-wY9zaBDDNqXAAHlFYADS16yp9TOLIIFkjevQL3K0ySE="; 17 17 }; 18 18 19 - vendorHash = "sha256-PENsCO2yFxLVZNPgx2OP+gWVNfjJAfXkwWS7tzlm490="; 19 + vendorHash = "sha256-XYj2hMsK7Gfrk25bRz/ooDkrXmuUdBQSF/ojF7OTQ4I="; 20 20 21 21 postPatch = '' 22 22 substituteInPlace main.go \
+3 -3
pkgs/by-name/fz/fzf-make/package.nix
··· 11 11 12 12 rustPlatform.buildRustPackage rec { 13 13 pname = "fzf-make"; 14 - version = "0.60.0"; 14 + version = "0.61.0"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "kyu08"; 18 18 repo = "fzf-make"; 19 19 rev = "v${version}"; 20 - hash = "sha256-5/hGTU8jQQvGp0c4FpB29H9wBbae8lVjlohivcVFFwI="; 20 + hash = "sha256-XDYJ+R/cQuzSfJyOYHKbbd+jrmAzumDs/wp5aoYEr80="; 21 21 }; 22 22 23 - cargoHash = "sha256-Cz0qR24zRXivF3pAo95GNnx8bjUKK96GFnntb68Lz1U="; 23 + cargoHash = "sha256-700KyKqrtZ9HuMBZVUbazrGyqzLE4s0ZyrWqLc8Y5WY="; 24 24 25 25 nativeBuildInputs = [ makeBinaryWrapper ]; 26 26
+2
pkgs/by-name/is/isa-l/package.nix
··· 98 98 # <instantiation>:4:26: error: unexpected token in argument list 99 99 # movk x7, p4_low_b1, lsl 16 100 100 "aarch64-darwin" 101 + # https://github.com/intel/isa-l/issues/188 102 + "i686-linux" 101 103 ]; 102 104 }; 103 105 })
+3 -3
pkgs/by-name/ka/kardolus-chatgpt-cli/package.nix
··· 9 9 # "chatgpt-cli" is taken by another package with the same upsteam name. 10 10 # To keep "pname" and "package attribute name" identical, the owners name (kardolus) gets prefixed as identifier. 11 11 pname = "kardolus-chatgpt-cli"; 12 - version = "1.8.8"; 12 + version = "1.8.9"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "kardolus"; 16 16 repo = "chatgpt-cli"; 17 17 rev = "v${finalAttrs.version}"; 18 - hash = "sha256-KdE4TzCkqIzs8xPYflHFpWqpUKqMMxy1YwfNRvyLc08="; 18 + hash = "sha256-XC8Uzrm8OjyEvdYArFt6rJJYrXKJeG3QgaOqgUyFNmw="; 19 19 }; 20 20 21 21 vendorHash = null; 22 22 # The tests of kardolus/chatgpt-cli require an OpenAI API Key to be present in the environment, 23 - # (e.g. https://github.com/kardolus/chatgpt-cli/blob/v1.8.8/test/contract/contract_test.go#L35) 23 + # (e.g. https://github.com/kardolus/chatgpt-cli/blob/v1.8.9/test/contract/contract_test.go#L35) 24 24 # which will not be the case in the pipeline. 25 25 # Therefore, tests must be skipped. 26 26 doCheck = false;
+2 -2
pkgs/by-name/me/messer-slim/package.nix
··· 8 8 }: 9 9 10 10 stdenv.mkDerivation rec { 11 - version = "5.0"; 11 + version = "5.1"; 12 12 pname = "messer-slim"; 13 13 14 14 src = fetchFromGitHub { 15 15 owner = "MesserLab"; 16 16 repo = "SLiM"; 17 17 rev = "v${version}"; 18 - hash = "sha256-fouZI5Uc8pY7eXD9Tm1C66j3reu7kijTEGA402bOJwc="; 18 + hash = "sha256-E1GxHdzY/5bxy8+ur3+/dheDOrmWaOrNcYDNSaY9cMU="; 19 19 }; 20 20 21 21 nativeBuildInputs = [
+2 -2
pkgs/by-name/nb/nb/package.nix
··· 11 11 12 12 stdenv.mkDerivation rec { 13 13 pname = "nb"; 14 - version = "7.20.1"; 14 + version = "7.21.1"; 15 15 16 16 src = fetchFromGitHub { 17 17 owner = "xwmx"; 18 18 repo = "nb"; 19 19 rev = version; 20 - hash = "sha256-926M5Tg1XWZR++neCou/uy1RtLeIbqHdA1vHaJv/e9o="; 20 + hash = "sha256-d9QhJBRdfTMIDHFOX4/fMmZnqCMeGqQhJTr60Ea7ucw="; 21 21 }; 22 22 23 23 nativeBuildInputs = [ installShellFiles ];
+2 -2
pkgs/by-name/pe/peergos/package.nix
··· 41 41 in 42 42 stdenv.mkDerivation rec { 43 43 pname = "peergos"; 44 - version = "1.10.0"; 44 + version = "1.11.0"; 45 45 src = fetchFromGitHub { 46 46 owner = "Peergos"; 47 47 repo = "web-ui"; 48 48 rev = "v${version}"; 49 - hash = "sha256-L6r0Ut/8HnJO7MYOZsDX7AzntVBTZb5iRKwaFvFKdUs="; 49 + hash = "sha256-JUeNNBWzIZlC1+sc1YV+3iPg4PMt+BevG5dDi4JybPk="; 50 50 fetchSubmodules = true; 51 51 }; 52 52
+2 -2
pkgs/by-name/qg/qgv/package.nix
··· 10 10 11 11 stdenv.mkDerivation (finalAttrs: { 12 12 pname = "qgv"; 13 - version = "1.3.5"; 13 + version = "1.3.6"; 14 14 15 15 src = fetchFromGitHub { 16 16 owner = "gepetto"; 17 17 repo = "qgv"; 18 18 rev = "v${finalAttrs.version}"; 19 - hash = "sha256-NUMCVqXw7euwxm4vISU8qYFfvV5HbAJsj/IjyxEjCPw="; 19 + hash = "sha256-602+CQAScZPNkuudwbRS1NJYYSoQCDwcRJcj8cS/10Q="; 20 20 }; 21 21 22 22 buildInputs = [
+55
pkgs/by-name/ra/radicle-job/package.nix
··· 1 + { 2 + lib, 3 + rustPlatform, 4 + fetchFromRadicle, 5 + fetchRadiclePatch, 6 + radicle-node, 7 + gitMinimal, 8 + versionCheckHook, 9 + }: 10 + 11 + rustPlatform.buildRustPackage (finalAttrs: { 12 + pname = "radicle-job"; 13 + version = "0.3.0"; 14 + 15 + src = fetchFromRadicle { 16 + seed = "iris.radicle.xyz"; 17 + repo = "z2UcCU1LgMshWvXj6hXSDDrwB8q8M"; 18 + tag = "releases/v${finalAttrs.version}"; 19 + hash = "sha256-6UrkKyIdSM5lSYNF/A3xIf3FGiM2pB/5s7F49jtn0KE="; 20 + }; 21 + 22 + patches = [ 23 + # https://app.radicle.xyz/nodes/rosa.radicle.xyz/rad:z2UcCU1LgMshWvXj6hXSDDrwB8q8M/patches/dac4fef89d07fe609dd5d3d75ea57f76f1cca3dc 24 + (fetchRadiclePatch { 25 + inherit (finalAttrs.src) seed repo; 26 + revision = "dac4fef89d07fe609dd5d3d75ea57f76f1cca3dc"; 27 + hash = "sha256-oFUkiBIqAa/DWqlTZw0LzHbgK/uhWik8qbRcGcGpkDY="; 28 + }) 29 + ]; 30 + 31 + cargoHash = "sha256-5GjLqs4ol7lUE96KwtE7W3lxL9H/A/0yDpiMDiLQDeY="; 32 + 33 + nativeCheckInputs = [ 34 + radicle-node 35 + gitMinimal 36 + ]; 37 + 38 + nativeInstallCheckInputs = [ versionCheckHook ]; 39 + versionCheckProgramArg = "--version"; 40 + doInstallCheck = true; 41 + 42 + passthru.updateScript = ./update.sh; 43 + 44 + meta = { 45 + description = "Create, update, and query Radicle Job Collaborative Objects"; 46 + homepage = "https://app.radicle.xyz/nodes/iris.radicle.xyz/rad:z2UcCU1LgMshWvXj6hXSDDrwB8q8M"; 47 + changelog = "https://app.radicle.xyz/nodes/iris.radicle.xyz/rad:z2UcCU1LgMshWvXj6hXSDDrwB8q8M/tree/CHANGELOG.md"; 48 + license = with lib.licenses; [ 49 + mit 50 + asl20 51 + ]; 52 + maintainers = with lib.maintainers; [ defelo ]; 53 + mainProgram = "rad-job"; 54 + }; 55 + })
+5
pkgs/by-name/ra/radicle-job/update.sh
··· 1 + #!/usr/bin/env nix-shell 2 + #!nix-shell -i bash -p coreutils gnugrep common-updater-scripts nix-update 3 + 4 + version=$(list-git-tags | grep -oP '^releases/v\K\d+\.\d+\.\d+$' | sort -rV | head -1) 5 + nix-update --version="$version" radicle-job
+3 -3
pkgs/by-name/ra/ranger/package.nix
··· 17 17 18 18 python3Packages.buildPythonApplication { 19 19 pname = "ranger"; 20 - version = "1.9.3-unstable-2025-08-03"; 20 + version = "1.9.3-unstable-2025-09-10"; 21 21 format = "setuptools"; 22 22 23 23 src = fetchFromGitHub { 24 24 owner = "ranger"; 25 25 repo = "ranger"; 26 - rev = "760fb03dccdfaeb2e08f3a7f4f867f913af2d74f"; 27 - hash = "sha256-lnnJz4/xtJZhxOPfJqZq/o7ke9DpaLCcr5dh2M2AbGg="; 26 + rev = "3f7a3546e59d52e5de5bbb13b9d9968bfaf6b659"; 27 + hash = "sha256-a+bfOE0/TfYvyxKjPXo5Q2WKSmfPaM+YJdggjcWFv5I="; 28 28 }; 29 29 30 30 LC_ALL = "en_US.UTF-8";
+2 -2
pkgs/by-name/so/source-meta-json-schema/package.nix
··· 5 5 cmake, 6 6 }: 7 7 let 8 - version = "11.1.1"; 8 + version = "11.8.1"; 9 9 in 10 10 stdenv.mkDerivation (finalAttrs: { 11 11 pname = "source-meta-json-schema"; ··· 15 15 owner = "sourcemeta"; 16 16 repo = "jsonschema"; 17 17 rev = "v${version}"; 18 - hash = "sha256-eXUiRpZko5ZHf2NVQu9HD+FgR3BxcTB9feNeI0kml+4="; 18 + hash = "sha256-JfQpjqjZSrOQM0ufccuhKNgxtzkJ+t+QDC8yFd1sTeQ="; 19 19 }; 20 20 21 21 nativeBuildInputs = [
-100
pkgs/by-name/sq/squashfsTools/4k-align.patch
··· 1 - This patch is an old patch; see below for the original message body. The patch 2 - has been updated several times to be compatible with new releases. 3 - 4 - * To apply to squashfs 4.4, commit 52eb4c279cd283ed9802dd1ceb686560b22ffb67. 5 - * To apply to squashfs 4.5, commit 0496d7c3de3e09da37ba492081c86159806ebb07. 6 - * To apply to squashfs 4.6, commit f7623b3d9953a1190fec181708c9489ef3522b9f. 7 - 8 - From af8a6dca694ddd38d8a775a2b5f9a24fe2d10153 Mon Sep 17 00:00:00 2001 9 - From: Amin Hassani <ahassani@google.com> 10 - Date: Thu, 15 Dec 2016 10:43:15 -0800 11 - Subject: [PATCH] mksquashfs 4K aligns the files inside the squashfs image 12 - 13 - Files inside a squashfs image are not necessarily 4k (4096) 14 - aligned. This patch starts each file in a 4k aligned address and pads 15 - zero to the end of the file until it reaches the next 4k aligned 16 - address. This will not change the size of the compressed 17 - blocks (especially the last one) and hence it will not change how the 18 - files are being loaded in kernel or unsquashfs. However on average this 19 - increases the size of the squashfs image which can be calculated by the 20 - following formula: 21 - 22 - increased_size = (number_of_unfragmented_files_in_image + number of fragments) * 2048 23 - 24 - The 4k alignment can be enabled by flag '-4k-align' 25 - --- 26 - squashfs-tools/mksquashfs.c | 16 ++++++++++++++++ 27 - 1 file changed, 16 insertions(+) 28 - 29 - diff --git a/squashfs-tools/mksquashfs.c b/squashfs-tools/mksquashfs.c 30 - index 3429aac..db164c2 100644 31 - --- a/squashfs-tools/mksquashfs.c 32 - +++ b/squashfs-tools/mksquashfs.c 33 - @@ -82,6 +82,8 @@ int noI = FALSE; 34 - int noId = FALSE; 35 - int noD = FALSE; 36 - int noX = FALSE; 37 - +int do_4k_align = FALSE; 38 - +#define ALIGN_UP(bytes, size) (bytes = (bytes + size - 1) & ~(size - 1)) 39 - 40 - /* block size used to build filesystem */ 41 - int block_size = SQUASHFS_FILE_SIZE; 42 - @@ -1624,6 +1626,9 @@ static void unlock_fragments() 43 - * queue at this time. 44 - */ 45 - while(!queue_empty(locked_fragment)) { 46 - + // 4k align the start of remaining queued fragments. 47 - + if(do_4k_align) 48 - + ALIGN_UP(bytes, 4096); 49 - write_buffer = queue_get(locked_fragment); 50 - frg = write_buffer->block; 51 - size = SQUASHFS_COMPRESSED_SIZE_BLOCK(fragment_table[frg].size); 52 - @@ -2627,6 +2632,9 @@ static void *frag_deflator(void *arg) 53 - write_buffer->size = compressed_size; 54 - pthread_mutex_lock(&fragment_mutex); 55 - if(fragments_locked == FALSE) { 56 - + // 4k align the start of each fragment. 57 - + if(do_4k_align) 58 - + ALIGN_UP(bytes, 4096); 59 - fragment_table[file_buffer->block].size = c_byte; 60 - fragment_table[file_buffer->block].start_block = bytes; 61 - write_buffer->block = bytes; 62 - @@ -3021,6 +3029,10 @@ static struct file_info *write_file_blocks(int *status, struct dir_ent *dir_ent, 63 - struct file_info *file; 64 - int bl_hash = 0; 65 - 66 - + // 4k align the start of each file. 67 - + if(do_4k_align) 68 - + ALIGN_UP(bytes, 4096); 69 - + 70 - if(pre_duplicate(read_size, dir_ent->inode, read_buffer, &bl_hash)) 71 - return write_file_blocks_dup(status, dir_ent, read_buffer, dup, bl_hash); 72 - 73 - @@ -6169,6 +6181,7 @@ static void print_options(FILE *stream, char *name, int total_mem) 74 - fprintf(stream, "or metadata. This is\n\t\t\tequivalent to "); 75 - fprintf(stream, "specifying -noI -noD -noF and -noX\n"); 76 - fprintf(stream, "\nFilesystem build options:\n"); 77 - + fprintf(stream, "-4k-align\t\tenables 4k alignment of all files\n"); 78 - fprintf(stream, "-tar\t\t\tread uncompressed tar file from standard in (stdin)\n"); 79 - fprintf(stream, "-no-strip\t\tact like tar, and do not strip leading "); 80 - fprintf(stream, "directories\n\t\t\tfrom source files\n"); 81 - @@ -6690,6 +6703,7 @@ static void print_summary() 82 - "compressed", no_fragments ? "no" : noF ? "uncompressed" : 83 - "compressed", no_xattrs ? "no" : noX ? "uncompressed" : 84 - "compressed", noI || noId ? "uncompressed" : "compressed"); 85 - + printf("\t4k %saligned\n", do_4k_align ? "" : "un"); 86 - printf("\tduplicates are %sremoved\n", duplicate_checking ? "" : 87 - "not "); 88 - printf("Filesystem size %.2f Kbytes (%.2f Mbytes)\n", bytes / 1024.0, 89 - @@ -8417,6 +8431,8 @@ print_compressor_options: 90 - } else if(strcmp(argv[i], "-comp") == 0) { 91 - /* parsed previously */ 92 - i++; 93 - + } else if(strcmp(argv[i], "-4k-align") == 0) { 94 - + do_4k_align = TRUE; 95 - } else { 96 - ERROR("%s: invalid option\n\n", argv[0]); 97 - print_options(stderr, argv[0], total_mem); 98 - -- 99 - 2.39.2 100 -
+2 -8
pkgs/by-name/sq/squashfsTools/package.nix
··· 14 14 15 15 stdenv.mkDerivation rec { 16 16 pname = "squashfs"; 17 - version = "4.6.1"; 17 + version = "4.7.2"; 18 18 19 19 src = fetchFromGitHub { 20 20 owner = "plougher"; 21 21 repo = "squashfs-tools"; 22 22 rev = version; 23 - hash = "sha256-fJ+Ijg0cj92abGe80+1swVeZamarVpnPYM7+izcPJ+k="; 23 + hash = "sha256-iQ+pBt+jvqI6zgZRV2MZM3CeFqiXe8Z+SS+rLOB4DLw="; 24 24 }; 25 - 26 - patches = [ 27 - # This patch adds an option to pad filesystems (increasing size) in 28 - # exchange for better chunking / binary diff calculation. 29 - ./4k-align.patch 30 - ]; 31 25 32 26 strictDeps = true; 33 27 nativeBuildInputs = [
+2
pkgs/by-name/tl/tlspool/package.nix
··· 15 15 p11-kit, 16 16 quickder, 17 17 unbound, 18 + openssl, 18 19 gitUpdater, 19 20 }: 20 21 ··· 49 50 p11-kit 50 51 quickder 51 52 unbound 53 + openssl 52 54 ]; 53 55 54 56 passthru.updateScript = gitUpdater { rev-prefix = "v"; };
+2 -1
pkgs/by-name/tm/tmux/package.nix
··· 10 10 runCommand, 11 11 withSystemd ? lib.meta.availableOn stdenv.hostPlatform systemd, 12 12 systemd, 13 - withUtf8proc ? true, 13 + # broken on i686-linux https://github.com/tmux/tmux/issues/4597 14 + withUtf8proc ? !(stdenv.hostPlatform.is32bit), 14 15 utf8proc, # gets Unicode updates faster than glibc 15 16 withUtempter ? stdenv.hostPlatform.isLinux && !stdenv.hostPlatform.isMusl, 16 17 libutempter,
+2 -2
pkgs/by-name/to/toml-sort/package.nix
··· 4 4 fetchFromGitHub, 5 5 }: 6 6 let 7 - version = "0.24.2"; 7 + version = "0.24.3"; 8 8 in 9 9 python3Packages.buildPythonApplication { 10 10 pname = "toml-sort"; ··· 15 15 owner = "pappasam"; 16 16 repo = "toml-sort"; 17 17 tag = "v${version}"; 18 - hash = "sha256-PuTXG8RIN8Mui5J8DV0yxe94y6FNs4TgPyHjEhpcKqM="; 18 + hash = "sha256-QlKksxwgdN37Z6nU1CloUT+G+mRNnkVnbI2++J3R+AY="; 19 19 }; 20 20 21 21 build-system = [ python3Packages.poetry-core ];
+2 -2
pkgs/by-name/tr/trealla/package.nix
··· 23 23 ]; 24 24 stdenv.mkDerivation (finalAttrs: { 25 25 pname = "trealla"; 26 - version = "2.82.9"; 26 + version = "2.82.33"; 27 27 28 28 src = fetchFromGitHub { 29 29 owner = "trealla-prolog"; 30 30 repo = "trealla"; 31 31 rev = "v${finalAttrs.version}"; 32 - hash = "sha256-2eexWmrVNjfOnK+upPJfUMxE+Xuo5dOyJrEFNGuCapc="; 32 + hash = "sha256-NjWvcNE0/FTDTafBpHen06A2UrCA4TBiQWGnDaz/3Yk="; 33 33 }; 34 34 35 35 postPatch = ''
+2 -2
pkgs/by-name/vc/vcpkg-tool/package.nix
··· 24 24 }: 25 25 stdenv.mkDerivation (finalAttrs: { 26 26 pname = "vcpkg-tool"; 27 - version = "2025-08-29"; 27 + version = "2025-09-03"; 28 28 29 29 src = fetchFromGitHub { 30 30 owner = "microsoft"; 31 31 repo = "vcpkg-tool"; 32 32 rev = finalAttrs.version; 33 - hash = "sha256-j+yFC3V+zMJ0UzevVI5L2xNX5+zh/3IyU4NFZRQIf10="; 33 + hash = "sha256-mQY5K0dBRWkZooeqRm5X0JXTuD4Xfzs9Vi5j+tbd1aw="; 34 34 }; 35 35 36 36 nativeBuildInputs = [
+36
pkgs/development/ocaml-modules/conan/cli.nix
··· 1 + { 2 + buildDunePackage, 3 + conan-unix, 4 + dune-site, 5 + alcotest, 6 + conan-database, 7 + crowbar, 8 + fmt, 9 + rresult, 10 + }: 11 + 12 + buildDunePackage { 13 + pname = "conan-cli"; 14 + inherit (conan-unix) version src meta; 15 + 16 + buildInputs = [ 17 + conan-unix 18 + dune-site 19 + ]; 20 + 21 + doCheck = true; 22 + 23 + preCheck = '' 24 + export DUNE_CACHE=disabled 25 + ''; 26 + 27 + nativeCheckInputs = [ conan-database ]; 28 + 29 + checkInputs = [ 30 + alcotest 31 + conan-database 32 + crowbar 33 + fmt 34 + rresult 35 + ]; 36 + }
+28
pkgs/development/ocaml-modules/conan/database.nix
··· 1 + { 2 + buildDunePackage, 3 + conan, 4 + alcotest, 5 + crowbar, 6 + fmt, 7 + rresult, 8 + }: 9 + 10 + buildDunePackage { 11 + pname = "conan-database"; 12 + inherit (conan) version src; 13 + 14 + propagatedBuildInputs = [ conan ]; 15 + 16 + doCheck = true; 17 + 18 + checkInputs = [ 19 + alcotest 20 + crowbar 21 + fmt 22 + rresult 23 + ]; 24 + 25 + meta = conan.meta // { 26 + description = "Database of decision trees to recognize MIME type"; 27 + }; 28 + }
+47
pkgs/development/ocaml-modules/conan/default.nix
··· 1 + { 2 + lib, 3 + fetchurl, 4 + buildDunePackage, 5 + version ? "0.0.6", 6 + ptime, 7 + re, 8 + uutf, 9 + alcotest, 10 + crowbar, 11 + fmt, 12 + rresult, 13 + }: 14 + 15 + buildDunePackage { 16 + pname = "conan"; 17 + inherit version; 18 + 19 + src = fetchurl { 20 + url = "https://github.com/mirage/conan/releases/download/v${version}/conan-${version}.tbz"; 21 + hash = "sha256-shAle4gXFf+53L+IZ4yFWewq7yZ5WlMEr9WotLvxHhY="; 22 + }; 23 + 24 + propagatedBuildInputs = [ 25 + ptime 26 + re 27 + uutf 28 + ]; 29 + 30 + doCheck = true; 31 + 32 + checkInputs = [ 33 + alcotest 34 + crowbar 35 + fmt 36 + rresult 37 + ]; 38 + 39 + minimalOCamlVersion = "4.12"; 40 + 41 + meta = { 42 + description = "Identify type of your file (such as the MIME type)"; 43 + homepage = "https://github.com/mirage/conan"; 44 + license = lib.licenses.bsd2; 45 + maintainers = [ lib.maintainers.vbgl ]; 46 + }; 47 + }
+30
pkgs/development/ocaml-modules/conan/lwt.nix
··· 1 + { 2 + buildDunePackage, 3 + conan, 4 + lwt, 5 + bigstringaf, 6 + alcotest, 7 + crowbar, 8 + fmt, 9 + rresult, 10 + }: 11 + 12 + buildDunePackage { 13 + pname = "conan-lwt"; 14 + inherit (conan) version src meta; 15 + 16 + propagatedBuildInputs = [ 17 + conan 18 + lwt 19 + bigstringaf 20 + ]; 21 + 22 + doCheck = true; 23 + 24 + checkInputs = [ 25 + alcotest 26 + crowbar 27 + fmt 28 + rresult 29 + ]; 30 + }
+32
pkgs/development/ocaml-modules/conan/unix.nix
··· 1 + { 2 + buildDunePackage, 3 + fetchpatch, 4 + conan, 5 + alcotest, 6 + crowbar, 7 + fmt, 8 + rresult, 9 + }: 10 + 11 + buildDunePackage { 12 + pname = "conan-unix"; 13 + inherit (conan) version src meta; 14 + 15 + patches = fetchpatch { 16 + url = "https://github.com/mirage/conan/commit/16872a71be3ef2870d32df849e7abcbaec4fe95d.patch"; 17 + hash = "sha256-/j9nNGOklzNrdIPW7SMNhKln9EMXiXmvPmNRpXc/l/Y="; 18 + }; 19 + 20 + propagatedBuildInputs = [ 21 + conan 22 + ]; 23 + 24 + doCheck = true; 25 + 26 + checkInputs = [ 27 + alcotest 28 + crowbar 29 + fmt 30 + rresult 31 + ]; 32 + }
+49
pkgs/development/python-modules/holistic-trace-analysis/default.nix
··· 1 + { 2 + buildPythonPackage, 3 + fetchFromGitHub, 4 + jupyterlab, 5 + lib, 6 + numpy, 7 + pandas, 8 + plotly, 9 + pydot, 10 + pytestCheckHook, 11 + setuptools, 12 + torch, 13 + }: 14 + 15 + buildPythonPackage rec { 16 + pname = "HolisticTraceAnalysis"; 17 + version = "0.5.0"; 18 + pyproject = true; 19 + 20 + src = fetchFromGitHub { 21 + owner = "facebookresearch"; 22 + repo = "HolisticTraceAnalysis"; 23 + tag = "v${version}"; 24 + hash = "sha256-3DuoP9gQ0vLlAAJ2uWw/oOEH/DTbn2xulzvqk4W3BiY="; 25 + }; 26 + 27 + build-system = [ setuptools ]; 28 + 29 + dependencies = [ 30 + jupyterlab 31 + numpy 32 + pandas 33 + plotly 34 + pydot 35 + torch 36 + ]; 37 + 38 + nativeCheckInputs = [ pytestCheckHook ]; 39 + 40 + pythonImportsCheck = [ "hta" ]; 41 + 42 + meta = { 43 + description = "Performance analysis tool to identify bottlenecks in distributed training workloads"; 44 + homepage = "https://github.com/facebookresearch/HolisticTraceAnalysis"; 45 + changelog = "https://github.com/facebookresearch/HolisticTraceAnalysis/releases/tag/v${version}"; 46 + license = lib.licenses.mit; 47 + maintainers = with lib.maintainers; [ jherland ]; 48 + }; 49 + }
+46
pkgs/development/python-modules/pytorchviz/default.nix
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchFromGitHub, 5 + distutils, 6 + fsspec, 7 + graphviz, 8 + torch, 9 + unittestCheckHook, 10 + }: 11 + 12 + buildPythonPackage rec { 13 + pname = "pytorchviz"; 14 + version = "0.0.2-unstable-2024-12-30"; 15 + pyproject = true; 16 + 17 + src = fetchFromGitHub { 18 + owner = "szagoruyko"; 19 + repo = "pytorchviz"; 20 + # No tags in the upstream GitHub repo 21 + rev = "5cf04c13e601366f6b9cf5939b5af5144d55b887"; 22 + hash = "sha256-La1X8Y64n/vNGDUEsw1iZ5Mb6/w3WayeWxa62QxLyHA="; 23 + }; 24 + 25 + dependencies = [ 26 + graphviz 27 + torch 28 + ]; 29 + 30 + nativeCheckInputs = [ 31 + unittestCheckHook 32 + distutils 33 + fsspec 34 + ]; 35 + 36 + unittestFlagsArray = [ "test/" ]; 37 + 38 + pythonImportsCheck = [ "torchviz" ]; 39 + 40 + meta = { 41 + description = "Small package to create visualizations of PyTorch execution graphs"; 42 + homepage = "https://github.com/szagoruyko/pytorchviz"; 43 + license = lib.licenses.mit; 44 + maintainers = with lib.maintainers; [ jherland ]; 45 + }; 46 + }
-5
pkgs/development/python-modules/simplesat/default.nix
··· 47 47 48 48 pythonImportsCheck = [ "simplesat" ]; 49 49 50 - preCheck = '' 51 - substituteInPlace simplesat/tests/test_pool.py \ 52 - --replace-fail "assertRaisesRegexp" "assertRaisesRegex" 53 - ''; 54 - 55 50 enabledTestPaths = [ "simplesat/tests" ]; 56 51 57 52 meta = with lib; {
+2 -2
pkgs/development/python-modules/translate-toolkit/default.nix
··· 28 28 29 29 buildPythonPackage rec { 30 30 pname = "translate-toolkit"; 31 - version = "3.16.0"; 31 + version = "3.16.1"; 32 32 33 33 pyproject = true; 34 34 ··· 36 36 owner = "translate"; 37 37 repo = "translate"; 38 38 tag = version; 39 - hash = "sha256-KKkYVih2iV/UpizqtYfgu5VPeqzKBJuIc2fzPmePndo="; 39 + hash = "sha256-AEMqnTnnbqNsVQY0eE2ATn2NbV9jVPtfCo3Lve7MEmg="; 40 40 }; 41 41 42 42 build-system = [ setuptools-scm ];
+34
pkgs/development/python-modules/types-six/default.nix
··· 1 + { 2 + lib, 3 + buildPythonPackage, 4 + fetchPypi, 5 + setuptools, 6 + }: 7 + 8 + buildPythonPackage rec { 9 + pname = "types-six"; 10 + version = "1.17.0.20250515"; 11 + pyproject = true; 12 + 13 + src = fetchPypi { 14 + pname = "types_six"; 15 + inherit version; 16 + hash = "sha256-9PfwOYy3kwTog5czbmQrFelvvqz1uW12Jdo2awadLRg="; 17 + }; 18 + 19 + build-system = [ setuptools ]; 20 + 21 + # Module doesn't have tests 22 + doCheck = false; 23 + 24 + pythonImportsCheck = [ 25 + "six-stubs" 26 + ]; 27 + 28 + meta = { 29 + description = "Typing stubs for six"; 30 + homepage = "https://github.com/python/typeshed"; 31 + license = lib.licenses.asl20; 32 + maintainers = with lib.maintainers; [ YorikSar ]; 33 + }; 34 + }
+2 -2
pkgs/os-specific/linux/prl-tools/default.nix
··· 43 43 in 44 44 stdenv.mkDerivation (finalAttrs: { 45 45 pname = "prl-tools"; 46 - version = "26.0.0-57238"; 46 + version = "26.0.1-57243"; 47 47 48 48 # We download the full distribution to extract prl-tools-lin.iso from 49 49 # => ${dmg}/Parallels\ Desktop.app/Contents/Resources/Tools/prl-tools-lin.iso 50 50 src = fetchurl { 51 51 url = "https://download.parallels.com/desktop/v${lib.versions.major finalAttrs.version}/${finalAttrs.version}/ParallelsDesktop-${finalAttrs.version}.dmg"; 52 - hash = "sha256-UuQGW1qYLGVLqAzApPKBqfOZdS23mCPsID4D0HATHNw="; 52 + hash = "sha256-jAOP9g3JCKxOFyiDdYJvvM9ecGDbMuCARCEu4sE7Cfs="; 53 53 }; 54 54 55 55 hardeningDisable = [
-10
pkgs/os-specific/linux/systemd/default.nix
··· 254 254 ++ lib.optionals (stdenv.hostPlatform.isLinux && stdenv.hostPlatform.isGnu) [ 255 255 ./0020-timesyncd-disable-NSCD-when-DNSSEC-validation-is-dis.patch 256 256 ] 257 - ++ lib.optionals (stdenv.hostPlatform.isPower64) [ 258 - # Auto-detect ELF ABI instead of hardcoding ELFv2 for BPF build 259 - # Fixes targeting ELFv1 260 - # https://github.com/systemd/systemd/pull/38307#issuecomment-3120543119 261 - (fetchpatch { 262 - name = "0101-systemd-meson.build-Detect-ELF-ABI-version-for-bpf-build-on-ppc64.patch"; 263 - url = "https://github.com/systemd/systemd/commit/f9509192512a4c4b9e3915a096333d4b6b297956.patch"; 264 - hash = "sha256-OGUw+hRCKZm+1EcR64M67QJ9c/PbS2Lk/A+1B3q4Jzs="; 265 - }) 266 - ] 267 257 ++ lib.optionals stdenv.hostPlatform.isMusl ( 268 258 let 269 259 # NOTE: the master-next branch does not have stable URLs.
+3 -3
pkgs/servers/monitoring/prometheus/nginx-exporter.nix
··· 7 7 8 8 buildGoModule rec { 9 9 pname = "nginx_exporter"; 10 - version = "1.4.2"; 10 + version = "1.5.0"; 11 11 12 12 src = fetchFromGitHub { 13 13 owner = "nginxinc"; 14 14 repo = "nginx-prometheus-exporter"; 15 15 rev = "v${version}"; 16 - sha256 = "sha256-V/4h212N1U4wMRt1oL6c1fe/BJH7FVjvx1cSb48mUi0="; 16 + sha256 = "sha256-N1+BfuhB0dZ8S88+onVwSiFABnFJjNlIVF/5puCuugs="; 17 17 }; 18 18 19 - vendorHash = "sha256-gsdmLg4wtSoY9tg4hDzf4wuCgYEEzopSLJ/7qkVvIzU="; 19 + vendorHash = "sha256-sT/hwqKJpQet1NgLuKvJDtB+y6mHCfHABMZ4PJNj490="; 20 20 21 21 ldflags = 22 22 let
-2
pkgs/top-level/all-packages.nix
··· 12838 12838 12839 12839 scantailor-universal = callPackage ../applications/graphics/scantailor/universal.nix { }; 12840 12840 12841 - seafile-client = qt6Packages.callPackage ../applications/networking/seafile-client { }; 12842 - 12843 12841 seq66 = qt5.callPackage ../applications/audio/seq66 { }; 12844 12842 12845 12843 sfxr-qt = libsForQt5.callPackage ../applications/audio/sfxr-qt { };
+10
pkgs/top-level/ocaml-packages.nix
··· 270 270 271 271 colors = callPackage ../development/ocaml-modules/colors { }; 272 272 273 + conan = callPackage ../development/ocaml-modules/conan { }; 274 + 275 + conan-cli = callPackage ../development/ocaml-modules/conan/cli.nix { }; 276 + 277 + conan-database = callPackage ../development/ocaml-modules/conan/database.nix { }; 278 + 279 + conan-lwt = callPackage ../development/ocaml-modules/conan/lwt.nix { }; 280 + 281 + conan-unix = callPackage ../development/ocaml-modules/conan/unix.nix { }; 282 + 273 283 conduit = callPackage ../development/ocaml-modules/conduit { }; 274 284 275 285 conduit-async = callPackage ../development/ocaml-modules/conduit/async.nix { };
+6
pkgs/top-level/python-packages.nix
··· 6680 6680 6681 6681 holidays = callPackage ../development/python-modules/holidays { }; 6682 6682 6683 + holistic-trace-analysis = callPackage ../development/python-modules/holistic-trace-analysis { }; 6684 + 6683 6685 hologram = callPackage ../development/python-modules/hologram { }; 6684 6686 6685 6687 holoviews = callPackage ../development/python-modules/holoviews { }; ··· 15243 15245 15244 15246 pytorch3d = callPackage ../development/python-modules/pytorch3d { }; 15245 15247 15248 + pytorchviz = callPackage ../development/python-modules/pytorchviz { }; 15249 + 15246 15250 pytouchline-extended = callPackage ../development/python-modules/pytouchline-extended { }; 15247 15251 15248 15252 pytouchlinesl = callPackage ../development/python-modules/pytouchlinesl { }; ··· 19307 19311 types-s3transfer = callPackage ../development/python-modules/types-s3transfer { }; 19308 19312 19309 19313 types-setuptools = callPackage ../development/python-modules/types-setuptools { }; 19314 + 19315 + types-six = callPackage ../development/python-modules/types-six { }; 19310 19316 19311 19317 types-tabulate = callPackage ../development/python-modules/types-tabulate { }; 19312 19318